Misuse by pupils Sample Clauses

Misuse by pupils. ● Teachers have the power to discipline pupils who engage in misbehaviour with regards to internet use. ● Any instances of misuse should be immediately reported to a member of staff, who will then report this to the Headteacher/Principal, using a Complaints Form. ● Any pupil who does not adhere to the rules outlined in our Acceptable Use Agreement and is found to be willfully misusing the internet, will have a letter sent to their parents explaining the reason for suspending their internet use. ● Members of staff may decide to issue other forms of disciplinary action to a pupil upon the misuse of the internet. This will be discussed with the Headteacher/Principal and will be issued once the pupil is on the school premises. ● Complaints of a child protection nature, such as when a pupil is found to be accessing extremist material, shall be dealt with in accordance with our Child Protection and Safeguarding Policy.
AutoNDA by SimpleDocs

Related to Misuse by pupils

  • Use by Others Forest Service shall have the right to use any road constructed by Purchaser under this contract for any and all purposes in connection with the protection and administration of the National Forest. Other parties, in connection with the logging of tributary National Forest timber, may use roads constructed by Purchaser hereunder when Contracting Officer determines that such use will not materially interfere with Purchaser’s Operations. Third party use shall be contin- gent upon Contracting Officer determining, and third party agreeing to pay, a fair share of maintenance cost com- mensurate with such commercial use. Unless otherwise provided in C5.4, Forest Service shall authorize other uses of roads constructed by Pur- chaser hereunder only if:

  • Restricted Use By Third Parties Third parties retained by Licensee shall have the right to use the Product to maintain Licensee’s business operations, including data processing, for the time period that they are engaged in such activities, provided that: (i) Licensee gives notice to Contractor of such third party, Site of intended use of the Product, and means of access; and (ii) such third party has executed, or agrees to execute, the Product manufacturer’s standard nondisclosure or restricted use agreement, which executed agreement shall be accepted by the Contractor (“Non-Disclosure Agreement”); and (iii) such third party maintains a logical or physical partition within its computer system so as to restrict use and access to the program to that portion solely dedicated to beneficial use for Licensee. In no event shall Licensee assume any liability for third party’s compliance with the terms of the Non-Disclosure Agreement, nor shall the Non- Disclosure Agreement create or impose any liabilities on the State or Licensee.

  • Breach by Authorized User An Authorized User’s breach shall not be deemed a breach of the Centralized Contract; rather, it shall be deemed a breach of the Authorized User’s performance under the terms and conditions of the Centralized Contract.

  • Prohibition on Unauthorized Use or Disclosure The Business Associate will neither use nor disclose the Covered Entity’s Protected Health Information, except as permitted or required by this Addendum or in writing by the Covered Entity or as Required by Law. This Agreement does not authorize the Business Associate to use or disclose the Covered Entity’s Protected Health Information in a manner that will violate Subpart E of 45 CFR Part 164 if done by the Covered Entity.

  • Restricted Use by Licensee Except as expressly authorized by the terms of license, Licensee shall not:

  • Use by Third Parties You may permit Authorized Third Parties to exercise the Usage Rights on Your behalf, provided that You are responsible for (a) ensuring that such Authorized Third Parties comply with this XXXX and (b) any breach of this XXXX by such Authorized Third Parties.

  • TERMINATION BY MPS - BREACH BY CONTRACTOR If Contractor fails to fulfill its obligations under this Contract in a timely or proper manner, or violates any of its provisions, MPS shall thereupon have the right to terminate it by giving five (5) days written notice before the effective date of termination of the Contract, specifying the alleged violations, and effective date of termination. The Contract shall not be terminated if, upon receipt of the notice, Contractor promptly cures the alleged violation with five (5) days. In the event of termination, MPS will only be liable for services rendered through the date of termination and not for the uncompleted portion, or for any materials or services purchased or paid for by Contractor for use in completing the Contract.

  • Breach by Licensee a. The licensee shall have five (5) business days from its receipt of written notice by Producer and/or Producer’s authorized representative to cure any alleged breach of this Agreement by Licensee. Licensee’s failure to cure the alleged breach within five (5) business days shall result in Licensee’s default of its obligations, its breach of this Agreement, and at Producer's sole discretion, the termination of Licensee’s rights hereunder.

  • SOFTWARE PIRACY PROHIBITION State or other public funds payable under this Contract shall not be used for the acquisition, operation, or maintenance of computer software in violation of federal copyright laws or applicable licensing restrictions. Contractor hereby certifies and warrants that, during the term of this Contract and any extensions, Contractor has and shall maintain in place appropriate systems and controls to prevent such improper use of public funds. If the State determines that Contractor is in violation of this provision, the State may exercise any remedy available at law or in equity or under this Contract, including, without limitation, immediate termination of this Contract and any remedy consistent with federal copyright laws or applicable licensing restrictions.

  • Misuse of Internet-based Services You may not use these services in any way that could harm them or impair anyone else’s use of them. You may not use the services to try to gain unauthorized access to any service, data, account or network by any means.

Time is Money Join Law Insider Premium to draft better contracts faster.